IDMS must enforce applicable access control policies, even after a user successfully signs on to CV.
An XCCDF Rule
Description
Unless the DBMS is secured properly, there are innumerable ways that a system and its data can be compromised. The IDMS SRTT is the basis for mitigating these problems.
- ID
- SV-251585r960792_rule
- Version
- IDMS-DB-000040
- Severity
- High
- References
- Updated
Remediation Templates
A Manual Procedure
Secure the desired resources by updating RHDCSRTT adding #SECRTT TYPE=ENTRY and TYPE=OCCURRENCE statements as needed. For example:
#SECRTT TYPE=ENTRY, X
RESTYPE=resource, X
SECBY=EXTERNAL, X
EXTCLS='CA@IDMS', X